Rahul Thareja:
CEO,
Hardware Hacker,
Robotics Engineer
Pushing the boundaries of hardware, robotics, and cybersecurity.
About Me
I'm Rahul Thareja, a passionate hardware hacker, robotics engineer, and CEO of C1PH3R-FSOCITEY, a cybersecurity startup. I'm driven
by the challenge of pushing technological boundaries, particularly in the realm of hardware security and robotics. My experience
encompasses a diverse range of projects, from developing innovative cybersecurity tools to building robots that push the limits of
what's possible.
Hardware Hacking
My journey into hardware hacking began with exploring the
world of microcontrollers like the ESP32, Arduino, and ESP8266.
This foundation led me to develop a deep understanding of
embedded systems programming and low-level hardware
manipulation.
Robotics Engineering
Currently, I'm working as a Robotics Engineer at
JetsonsRobotics, a robotics startup incubated at IIT Kanpur's
SIIC. This experience allows me to combine my hardware
hacking skills with advanced robotics principles, enabling me to
design and build robots for various applications.
My Skills
My diverse skillset allows me to approach challenges from multiple angles, blending my expertise in
hardware engineering, cybersecurity, robotics, and programming.
Hardware Engineering
•ESP32/ESP8266
•CC1101 RF Modules
•NRF24L01
•SH1106 OLED Displays
•Seeed Studio XIAO ESP32-S3
Cybersecurity
•Deauthentication
•Wi-Fi Security
•Packet Sniffing
•RF Jamming
•Bluetooth Security
Programming
•Embedded Systems Programming (Arduino
IDE, ESP-IDF)
•Computer Vision (ROS, Ubuntu)
•Python for Automation
Robotics Engineering
•System Integration
•Hardware Control
Featured Projects
These projects highlight my ability to blend hardware hacking, cybersecurity, and robotics, creating innovative and impactful solutions.
Meow-FI
A tool for detecting deauthentication packets, designed to
enhance Wi-Fi security by identifying and analyzing
suspicious network activity.
Chaos-Injector
A Bad-USB project that demonstrates the vulnerabilities of
USB devices, showcasing how attackers can exploit these
vulnerabilities to gain unauthorized access to systems.
ESP8266 Mini Password Cracker
A tool for testing Wi-Fi passwords using a simple and
intuitive UI with OLED display and buttons, providing a
practical and accessible way to assess network security.
Cybersecurity Tool with ESP32
A versatile cybersecurity tool with capabilities like Wi-Fi
analysis, Bluetooth spoofing, RF signal jamming, and more,
leveraging NRF24L01, Bluetooth, and Wi-Fi modules for a
wide range of security assessments.
Meow-FI
A tool for detecting deauthentication packets, designed to enhance Wi-Fi security by
identifying and analyzing suspicious network activity.
This can be further programmed to be a captive portal, or password cracking device or
simply an electronic badge for displaying information during a conference or conventions.
It has GPIO Pinout support, which can be further extended to add more elements like
various sensors.
Chaos-Injector
A security-focused project designed to demonstrate the
vulnerabilities inherent in USB devices, showcasing how
attackers can exploit these weaknesses to gain unauthorized
access to systems. The project simulates the behavior of a
malicious USB device that can execute various attacks, such as
emulating a keyboard, injecting keystrokes, or executing scripts
to compromise the target system. It provides a hands-on
demonstration of how unsuspecting users can fall victim to
USB-based attacks, while also highlighting the importance of
securing USB ports and implementing strong endpoint
protection strategies. This project aims to raise awareness
about the risks of USB devices in cybersecurity and the need for
vigilant security measures.
Zap Net
ZapNet is an open-source, interactive Wi-Fi deauthentication tool
designed for network security testing. It offers the following features:
•Scan Networks: Detect nearby Wi-Fi networks with details like SSID
and signal strength.
•Deauthenticate Users: Disconnect users from a network by exploiting
Wi-Fi protocol vulnerabilities.
•Create Network Clones: Generate fake networks to confuse and
deceive users.
WarDriver
Wardriving involves driving around with a device to scan and
map Wi-Fi networks. It helps identify network details like SSIDs,
signal strength, encryption types, and locations. Wardriving is
used for network analysis and security auditing, highlighting
unsecured or weak networks. While legal for scanning,
accessing networks without permission is illegal. It’s a common
practice for security professionals to test and improve wireless
network security.
Startup and Incubation
C1PH3R-FSOCITEY is a hardware hacking startup that specializes in hardware cybersecurity products and services. Our mission is to empower
individuals and organizations with the tools and knowledge to create and hack hardware.
Mission and Vision
At C1PH3R-FSOCITEY, our mission is to empower individuals and
organizations with the tools, knowledge, and expertise needed to
create, hack, and secure hardware. We strive to push the boundaries of
hardware security, fostering innovation while ensuring that the
hardware ecosystem remains resilient against evolving cyber threats.
Our vision is to be the leading force in hardware cybersecurity, driving
advancements in both the creation of secure hardware solutions and
the education of the global community. We aim to build a world where
individuals and businesses can create and modify hardware with
confidence, knowing that their devices are protected from emerging
vulnerabilities and attacks.
Achievements and Growth
•Developed advanced hardware security tools like Wi-Fi analyzers,
deauthentication devices, and RF signal jammers, used globally by
professionals.
•Established a strong presence as a leader in hardware hacking and
cybersecurity.
•Incubated at IIT Kanpur, contributing to next-gen cybersecurity
innovations.
•Invited as a guest of honor to conduct a hardware hacking seminar
at Lovely Professional University, Punjab.
•Partnered with organizations to deliver custom hardware security
solutions, enhancing the protection of critical infrastructure.
Achievements and Recognition
My work has been recognized in the hardware engineering and cybersecurity communities,
leading to collaborations and accolades that underscore my commitment to innovation.
1Guest of Honor
I was honored to be the guest of
honor at a hardware hacking seminar
at Lovely Professional University in
Punjab, sharing my experience and
inspiring the next generation of
hardware hackers.
2High-Profile
Collaborations
I have had the privilege of
collaborating on high-profile projects
with leading industry players,
contributing my expertise to
innovative solutions that address
critical cybersecurity challenges.
3Awards and Recognition
My contributions have been acknowledged through awards and recognition, further
motivating me to push the boundaries of hardware engineering and cybersecurity.
Get in Touch
I am always eager to connect with like-minded individuals and collaborate on projects that push the boundaries of technology. Let's
explore the potential of hardware hacking, robotics, and cybersecurity together.
LinkedIn
Connect with me on LinkedIn to stay
updated on my latest projects and
insights.
GitHub
Explore my open-source projects and
code contributions on GitHub.
Email
Reach out to me at [email protected] for
collaboration or inquiries.